General

  • Target

    2d84a0b2949f5bc68bcf73f1a38fc021a359036c65ea083e87e5cb395cff969a

  • Size

    70KB

  • MD5

    01d7830e26b551e33a0a017ea895d2a1

  • SHA1

    4be2b4811eb3782f0ab259c35bd5b02bc7bc3fd8

  • SHA256

    2d84a0b2949f5bc68bcf73f1a38fc021a359036c65ea083e87e5cb395cff969a

  • SHA512

    5668536c6009b4485dfb40da2ef2a4e985b840ae92c1b5079ad1f8e9dae12a3477da2a1eb16fd3ad81aa46ba68998cdc5473d200a0dccf98c19c7f7e6af1051b

  • SSDEEP

    1536:gFTnqpKxynVEGeifCSzTPb542HkLbvJfxa:gFTxGeifrvb59H+bvJ5a

Score
10/10

Malware Config

Extracted

Family

blacknet

Botnet

HacKed

C2

https://lovegunny.net

Mutex

BN[tuFcXBCi-9342877]

Attributes
  • antivm

    true

  • elevate_uac

    false

  • install_name

    WindowsUpdate.exe

  • splitter

    |BN|

  • start_name

    2965b7eabf9eb6ce83de7d2260ab71ba

  • startup

    true

  • usb_spread

    true

Signatures

  • BlackNET payload 1 IoCs
  • Blacknet family
  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2d84a0b2949f5bc68bcf73f1a38fc021a359036c65ea083e87e5cb395cff969a
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections